Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security and privacy for a connected vehicle environment

Similar presentations


Presentation on theme: "Security and privacy for a connected vehicle environment"— Presentation transcript:

1 Security and privacy for a connected vehicle environment
CAMP PI: CSI Detroit. No camping CAMP: Crash Avoidance VSC5: 7 OEMs within Security and privacy for a connected vehicle environment Benedikt Brecht, Principal Investigator, Crash Avoidance Metrics Partners (CAMP)

2 Vehicles and infrastructure exchanging unmanaged messages
What is V2X? Vehicles and infrastructure exchanging unmanaged messages Vehicle 2 Vehicle and Vehicle 2 Infrastructure Communication V2V system can alert the driver (thus help prevent crashes) by issuing different safety warnings Messages include information on current position, velocity, etc. Photo Source: U.S. DOT

3 Do Not Pass Warning - Sensors can hardly detect incoming vehicles
Photo Source: Continental

4 Left Turn Assist No detection outside of line of sight
Photo Source: Cadillac

5 Traffic Light Assistant
Show time to green Show time to red Photo Source: Audi/jalopnik.com

6 establish trust Being able to verify information
Messages received over the air: integrity and authentication required One wrong message and customer’s trust is lost (No second chance) Photo Source: Núria i JC via Flickr

7 ensure privacy Standard IT Technology for first two requirements
Nobody shall be able to track vehicles by using this technology Prevent SCMS from collecting Personally Identifiable Information (PII) Prevent trip tracking by outsiders Prevent trip tracking by SCMS insiders Privacy by design Photo Source: Independent.co.uk

8 V2X SCMS Architecture

9 Misbehavior Detection
This is obvious misbehavior ;-) Misbehaving / attacking units need to be removed Misbehavior Detection on application level Photo Source: Brittni Gee Photography via Flickr

10 Misbehavior detection – proximity plausibility
One example of misbehavior detection Photo Source: Kris LoCascio via Flickr

11 “Linkage values” used to identify certificates during misbehavior detection
Photo Source: something-familiar.com

12 Penalty / device revocation
Device should no longer be trusted - MA revokes certificates via Certificate Revocation List (CRL) Pseudonym and Enrollment cert revocation CRL distributed to vehicles and to be checked regularly in verification process of incoming BSMs Photo Source: Andy Devlin/NHLI via Getty Images

13 Photo Source: Benedikt Brecht

14 USDOT CV pilots awarded 2015: http://www.its.dot.gov/pilots/
Sources: Elector-based Root Management System to Manage a Public Key Infrastructure: A security credential management system for V2V communications, Dec Vehicle Safety Communications Security Studies: Technical Design of the Security Credential Management System, July 2013 Security Credential Management System Design, April USDOT CV pilots awarded 2015: USDOT Smart City Challenge: IEEE 1609: IEEE p: SAE J2945/1: Photo Source: Wikimedia Commons/Jean-Pol GRANDMONT

15 @CodeFried Photo Source: Free for Commercial Use via Flickr


Download ppt "Security and privacy for a connected vehicle environment"

Similar presentations


Ads by Google